Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 21 to 30 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen.
    Multi-party off-the-record messaging.
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 2009 (0) 2009
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    Reusing Static Keys in Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach.
    Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Comparing
    Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the pre- and post-specified peer models for key agreement.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the Pre- and Post-specified Peer Models for Key Agreement.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard.
    Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008 2008 (0) 2008
    Conference paper
    Berkant Ustaoglu.
    Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
    Des. Codes Cryptography 2008, Volume 46 (0) 2008
    Conference paper
    Berkant Ustaoglu.
    Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings 2006 (0) 2006
    Show item 21 to 30 of 30  

    Your query returned 30 matches in the database.